{"id":16,"date":"2026-02-10T20:57:00","date_gmt":"2026-02-10T20:57:00","guid":{"rendered":"https:\/\/student.wp.odu.edu\/fsull002\/?page_id=16"},"modified":"2026-02-10T20:57:00","modified_gmt":"2026-02-10T20:57:00","slug":"cyse-journal-entries","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/fsull002\/cyse-journal-entries\/","title":{"rendered":"CYSE Journal Entries"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Week 1 &#8211; Top Careers<\/h2>\n\n\n\n<p>After reading the work, a few interesting careers potentially combining social sciences and cybersecurity jumped out to me.<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp;The first thought I had was private security from a cybersecurity standpoint. Nowadays we have a lot of older generation people interacting with technology that is advancing at a breakneck pace.&nbsp; In the cybersecurity world there are already services for corporations to outsource their cybersecurity, so why shouldn&#8217;t private citizens be able to do the same thing?&nbsp; I&#8217;m sure this already happens, and it would be an interesting career to be say, Ryan Gosling&#8217;s private cybersecurity specialist.<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp;Data science and cybersecurity go hand in hand.&nbsp; Aspects of cybersecurity already involve collecting data to form baseline activity profiles for networks.&nbsp; Baseline profiles are used to detect intrusions or abnormal activity on the network and warn against potentially malicious activity.<\/p>\n\n\n\n<p>\u00a0 \u00a0 \u00a0Criminal Justice is one of the most obvious marriages of cybersecurity and political science.\u00a0 Police, military, and the government all have applications of Criminal Justice in a cybersecurity field.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 2 &#8211; Empiricism and Cybersecurity<\/h2>\n\n\n\n<p>Empirical data seeks to remove the element of human error from scientific research.\u00a0 Bias, even with empirical studies, is difficult to completely remove from the interpretation of data, but if the data is empirical, then it can tell no lie.\u00a0 <\/p>\n\n\n\n<p>In cybersecurity, collecting baseline patterns on usage activity is a strategy used to secure a network.\u00a0 This baseline activity is often used in Intrusion Detection, or prevention, systems to determine abnormal activity over the network.\u00a0 For example, having a spike in activity in upload speeds to an unknown destination on a network could mean that someone is sending off data they shouldn&#8217;t be.\u00a0 Without the empirical data of the baseline, and the traffic monitoring systems in place, this kind of network activity would go unnoticed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 &#8211; Top Careers After reading the work, a few interesting careers potentially combining social sciences and cybersecurity jumped out to me. &nbsp; &nbsp; &nbsp;The first thought I had was private security from a cybersecurity standpoint. Nowadays we have&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/fsull002\/cyse-journal-entries\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31960,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/pages\/16"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/users\/31960"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":17,"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/pages\/16\/revisions\/17"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/fsull002\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}